General
-
Target
Loader.zip
-
Size
5.5MB
-
Sample
250105-eb6r4asqal
-
MD5
2a3780d97d1e6bc73d9d258ecc0268a2
-
SHA1
d9153ac2653e109c6b483048545fc2fb2a08ecbc
-
SHA256
d7a0ceac47ad88b84af4d9c27ebaf1665823eacbd50aa4e72e142cd1f76cc459
-
SHA512
0458f66de203c11f5aa934fcc3f89e95bb5086f1d3dbb4f06eadaed5d19bc681719b61aaa89807bed0d97dd53f09d14888c96c35ae3aa5ad7178baf42f8c2260
-
SSDEEP
98304:S9LTqNcUCTJl9Fb2tceYN/6fPD6OQa4tyST5GzwyEJVaHKJcAEkScDPDv6Z2tjoM:SxqUtlDSK/6T6XaDQ5XvrGjZcDPDSGoM
Static task
static1
Behavioral task
behavioral1
Sample
Loader.cmd
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
Loader.cmd
Resource
win11-20241007-en
Malware Config
Extracted
quasar
-
encryption_key
6F38862AF940DB0B877E1A5C024641D617D7FAB6
-
reconnect_delay
3000
Targets
-
-
Target
Loader.cmd
-
Size
7.3MB
-
MD5
1bec1098946595a03fa067a3ef7ce292
-
SHA1
89cfb4a2f8800f1b944d906d959639907672317d
-
SHA256
a8f184a333fb89f41ddca323472463b4ee2cbed63d26d105823300148e2015cb
-
SHA512
dc7e73ed353d50b73a0eb6f1d955812a29fc5e05df300487d1eda49cc78e6748929a17cd59b58148f7e8696fd0fdfd21e8269af6788f1037bda6d8ddf30c6082
-
SSDEEP
49152:262lW3ZtqF71E0f+DP24xmB1F+RfHhZzvTUPbFJMg0FQ5/Ai4cr5YSW7iFsihJv1:k
-
Quasar family
-
Quasar payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Executes dropped EXE
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-